Skip to main content
Erschienen in: Cluster Computing 2/2024

17.06.2023

Supporting dynamic update scheme for assured deletion based-multi-copy association tree

verfasst von: Junfeng Tian, Ruxin Bai, Tianfeng Zhang

Erschienen in: Cluster Computing | Ausgabe 2/2024

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cloud storage services provide storage resources for resource-constrained users, which reduces their local overhead and computing cost. As an extension of cloud computing, fog computing introduces a fog layer between the cloud and users to deploy computing, storage, and other types of equipment, allowing users to operate outsourced data conveniently. Although cloud storage brings many conveniences to users, assured data deletion is still one of the crucial security challenges. This paper proposes an efficient and secure cloud data deletion scheme (SDUS-AD) that supports dynamic data updates in multi-copy scenarios. In this scheme, a new dynamic structure called Multi-Copy Association Tree is designed to realize the dynamic update of outsourced data efficiently and safely. A cloud-fog-user layer structure is used to meet the needs of resource-constrained users to update data and ensure the confidentiality of data privacy. Detailed performance analysis and simulation experiments show that SDUS-AD is efficient, safe, and feasible.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Dhal, K., Pattnaik, P.K., Rai, S.C.: RACC: an efficient and revocable fine grained access control model for cloud storage. Int. J. Knowl.-Based Intell. Eng. Syst. 23(1), 21–32 (2019) Dhal, K., Pattnaik, P.K., Rai, S.C.: RACC: an efficient and revocable fine grained access control model for cloud storage. Int. J. Knowl.-Based Intell. Eng. Syst. 23(1), 21–32 (2019)
2.
Zurück zum Zitat Zhang, J., Wang, B., He, D., Wang, X.: Improved secure fuzzy auditing protocol for cloud data storage. Soft. Comput. 23(10), 3411–3422 (2019)CrossRef Zhang, J., Wang, B., He, D., Wang, X.: Improved secure fuzzy auditing protocol for cloud data storage. Soft. Comput. 23(10), 3411–3422 (2019)CrossRef
3.
Zurück zum Zitat Yang, T., Li, J., Yu, B.: A secure ciphertext self-destruction scheme with attribute-based encryption. Math. Probl. Eng. 2015, 1–8 (2015)MathSciNet Yang, T., Li, J., Yu, B.: A secure ciphertext self-destruction scheme with attribute-based encryption. Math. Probl. Eng. 2015, 1–8 (2015)MathSciNet
4.
Zurück zum Zitat Yi, S., Qin, Z., Li, Q.: Security and privacy issues of fog computing: a survey. Wirel. Algorithms Syst. Appl. 2015, 685–695 (2015) Yi, S., Qin, Z., Li, Q.: Security and privacy issues of fog computing: a survey. Wirel. Algorithms Syst. Appl. 2015, 685–695 (2015)
5.
Zurück zum Zitat Guo, R., Zhuang, C., Shi, H., Zhang, Y., Zheng, D.: A lightweight verifiable outsourced decryption of attribute-based encryption scheme for blockchain-enabled wireless body area network in fog computing. Int. J. Distrib. Sens. Netw. 16(2), 155014772090679 (2020)CrossRef Guo, R., Zhuang, C., Shi, H., Zhang, Y., Zheng, D.: A lightweight verifiable outsourced decryption of attribute-based encryption scheme for blockchain-enabled wireless body area network in fog computing. Int. J. Distrib. Sens. Netw. 16(2), 155014772090679 (2020)CrossRef
6.
Zurück zum Zitat Jiang, J., Tang, L., Gu, K., Jia, W.: Secure computing resource allocation framework for open fog computing. Comput. J. 63(4), 567–592 (2020)MathSciNetCrossRef Jiang, J., Tang, L., Gu, K., Jia, W.: Secure computing resource allocation framework for open fog computing. Comput. J. 63(4), 567–592 (2020)MathSciNetCrossRef
7.
Zurück zum Zitat Shahid, M., Hameed, A., Islam, S., Khattak, H., Din, I., Rodrigues, J.: Energy and delay efficient fog computing using caching mechanism. Comput. Commun. 154, 534–541 (2020)CrossRef Shahid, M., Hameed, A., Islam, S., Khattak, H., Din, I., Rodrigues, J.: Energy and delay efficient fog computing using caching mechanism. Comput. Commun. 154, 534–541 (2020)CrossRef
8.
Zurück zum Zitat Roman, R., Lopez, J., Mambo, M.: Mobile edge computing, Fog et al.: a survey and analysis of security threats and challenges. Future Gener. Comput. Syst. 78, 680–698 (2018)CrossRef Roman, R., Lopez, J., Mambo, M.: Mobile edge computing, Fog et al.: a survey and analysis of security threats and challenges. Future Gener. Comput. Syst. 78, 680–698 (2018)CrossRef
9.
Zurück zum Zitat Stojmenovic, I., Wen, S., Huang, X., Luan, H.: An overview of fog computing and its security issues. Concurr. Comput. Pract. Exp. 28(10), 2991–3005 (2016)CrossRef Stojmenovic, I., Wen, S., Huang, X., Luan, H.: An overview of fog computing and its security issues. Concurr. Comput. Pract. Exp. 28(10), 2991–3005 (2016)CrossRef
10.
Zurück zum Zitat Huang, X., Xiang, Y., Bertino, E., Zhou, J., Xu, L.: Robust multi-factor authentication for fragile communications. IEEE Trans. Dependable Secure Comput. 11(6), 568–581 (2014)CrossRef Huang, X., Xiang, Y., Bertino, E., Zhou, J., Xu, L.: Robust multi-factor authentication for fragile communications. IEEE Trans. Dependable Secure Comput. 11(6), 568–581 (2014)CrossRef
11.
Zurück zum Zitat Choo, K., Domingo-Ferrer, J., Zhang, L.: Cloud cryptography: theory, practice and future research directions. Futur. Gener. Comput. Syst. 62, 51–53 (2016)CrossRef Choo, K., Domingo-Ferrer, J., Zhang, L.: Cloud cryptography: theory, practice and future research directions. Futur. Gener. Comput. Syst. 62, 51–53 (2016)CrossRef
14.
Zurück zum Zitat Wang, Q., Zhou, F., Peng, S., Xu, Z.: Verifiable outsourced computation with full delegation. In: Proceedings of the International Conference on Algorithms and Architectures for Parallel Processing. ICA3PP 2018, pp. 270–287 (2018) Wang, Q., Zhou, F., Peng, S., Xu, Z.: Verifiable outsourced computation with full delegation. In: Proceedings of the International Conference on Algorithms and Architectures for Parallel Processing. ICA3PP 2018, pp. 270–287 (2018)
15.
Zurück zum Zitat Xu, J., Wei, L., Zhang, Y., Wang, A., Zhou, F., Gao, C.: Dynamic fully homomorphic encryption-based merkle tree for lightweight streaming authenticated data structures. J. Netw. Comput. Appl. 107, 113–124 (2018)CrossRef Xu, J., Wei, L., Zhang, Y., Wang, A., Zhou, F., Gao, C.: Dynamic fully homomorphic encryption-based merkle tree for lightweight streaming authenticated data structures. J. Netw. Comput. Appl. 107, 113–124 (2018)CrossRef
16.
Zurück zum Zitat Miao, M., Wang, J., Ma, J.: New publicly verifiable databases supporting insertion operation. In: Proceedings of the 18th International Conference on Network-Based Information Systems, pp. 2–4. IEEE, New York, Taipei, Taiwan (2015) Miao, M., Wang, J., Ma, J.: New publicly verifiable databases supporting insertion operation. In: Proceedings of the 18th International Conference on Network-Based Information Systems, pp. 2–4. IEEE, New York, Taipei, Taiwan (2015)
17.
Zurück zum Zitat Tian, J., Chang, F.: Trusted cloud platform management model based on TPM alliance. J. Commun. 37(2), 1–10 (2016) Tian, J., Chang, F.: Trusted cloud platform management model based on TPM alliance. J. Commun. 37(2), 1–10 (2016)
18.
Zurück zum Zitat Hughes, G., Coughlin, T., Commins, D.: Disposal of disk and tape data by secure sanitization. IEEE Secur. Priv. Mag. 7(4), 29–34 (2009)CrossRef Hughes, G., Coughlin, T., Commins, D.: Disposal of disk and tape data by secure sanitization. IEEE Secur. Priv. Mag. 7(4), 29–34 (2009)CrossRef
19.
Zurück zum Zitat Paul, M., Saxena, A.: Proof of erasability for ensuring comprehensive data deletion in cloud computing. In: Proceedings of the Recent Trends in Network Security and Applications, pp. 340–348. CNSA (2010) Paul, M., Saxena, A.: Proof of erasability for ensuring comprehensive data deletion in cloud computing. In: Proceedings of the Recent Trends in Network Security and Applications, pp. 340–348. CNSA (2010)
20.
Zurück zum Zitat Perito, D., Tsudik, G.: Secure code update for embedded devices via proofs of secure erasure. In: Proceedings of the 15th European Symposium on Research in Computer Security, pp. 643–662. ESORICS (2010) Perito, D., Tsudik, G.: Secure code update for embedded devices via proofs of secure erasure. In: Proceedings of the 15th European Symposium on Research in Computer Security, pp. 643–662. ESORICS (2010)
21.
Zurück zum Zitat Luo, Y., Xu, M., Fu, S., Wang, D.: Enabling assured deletion in the cloud storage by overwriting. In: Proceedings of the 4th ACM International Workshop on Security in Cloud Computing. SCC '16, pp.17–23. ACM, New York, NY, USA (2016) Luo, Y., Xu, M., Fu, S., Wang, D.: Enabling assured deletion in the cloud storage by overwriting. In: Proceedings of the 4th ACM International Workshop on Security in Cloud Computing. SCC '16, pp.17–23. ACM, New York, NY, USA (2016)
22.
Zurück zum Zitat Tang, Y., Lee, P., Liu, J., Perlman, R.: Fade: secure overlay cloud storage with file assured deletion. Security and privacy in communication networks. SecureComm 2010, 380–397 (2010) Tang, Y., Lee, P., Liu, J., Perlman, R.: Fade: secure overlay cloud storage with file assured deletion. Security and privacy in communication networks. SecureComm 2010, 380–397 (2010)
23.
Zurück zum Zitat Tian, J., Zhang, T.: Secure and effective assured deletion scheme with orderly overwriting for cloud data. J. Super Comput. 78, 9326–9354 (2022)CrossRef Tian, J., Zhang, T.: Secure and effective assured deletion scheme with orderly overwriting for cloud data. J. Super Comput. 78, 9326–9354 (2022)CrossRef
24.
Zurück zum Zitat Li, H., Sun, W., Ll, F., Wang, B.: Secure and privacy-preserving data storage service in public cloud. J. Comput. Res. Dev. 51(7), 1397–1409 (2014) Li, H., Sun, W., Ll, F., Wang, B.: Secure and privacy-preserving data storage service in public cloud. J. Comput. Res. Dev. 51(7), 1397–1409 (2014)
25.
Zurück zum Zitat Boneh, D., Lipton, R.: A revocable backup system. In: Proceedings of the sixth USENIX Security Symposium. San Jose, CA, USA, pp. 91–96 (1996) Boneh, D., Lipton, R.: A revocable backup system. In: Proceedings of the sixth USENIX Security Symposium. San Jose, CA, USA, pp. 91–96 (1996)
26.
Zurück zum Zitat Perlman, R.: File system design with assured delete. In: Proceedings of the Third IEEE International Security in Storage Workshop. SISW'05. San Francisco, CA, USA, pp. 83–88 (2005) Perlman, R.: File system design with assured delete. In: Proceedings of the Third IEEE International Security in Storage Workshop. SISW'05. San Francisco, CA, USA, pp. 83–88 (2005)
27.
Zurück zum Zitat Mo, Z., Xiao, Q., Zhou, Y., Chen, S.: On deletion of outsourced data in cloud computing. In: Proceedings of the IEEE 7th International Conference on Cloud Computing, pp. 344–351 (2014) Mo, Z., Xiao, Q., Zhou, Y., Chen, S.: On deletion of outsourced data in cloud computing. In: Proceedings of the IEEE 7th International Conference on Cloud Computing, pp. 344–351 (2014)
28.
Zurück zum Zitat Xue, L., Yu, Y., Li, Y., Au, M.H., Du, X., Yang, B.: Efficient attribute-based encryption with attribute revocation for assured data deletion. Inf. Sci. 479, 640–650 (2018)CrossRef Xue, L., Yu, Y., Li, Y., Au, M.H., Du, X., Yang, B.: Efficient attribute-based encryption with attribute revocation for assured data deletion. Inf. Sci. 479, 640–650 (2018)CrossRef
29.
Zurück zum Zitat Dulin., Zhang, Z., Tan, S., Wang, J., Tao, X.: An associated deletion scheme for multi-copy in cloud storage. In: Proceedings of the International Conference on Algorithms and Architectures for Parallel Processing. ICA3PP, pp. 511–526 (2018) Dulin., Zhang, Z., Tan, S., Wang, J., Tao, X.: An associated deletion scheme for multi-copy in cloud storage. In: Proceedings of the International Conference on Algorithms and Architectures for Parallel Processing. ICA3PP, pp. 511–526 (2018)
30.
Zurück zum Zitat Yang, C., Chen, X., Xiang, Y.: Blockchain-based publicly verifiable data deletion scheme for cloud storage. J. Netw. Comput. Appl. 103, 185–193 (2018)CrossRef Yang, C., Chen, X., Xiang, Y.: Blockchain-based publicly verifiable data deletion scheme for cloud storage. J. Netw. Comput. Appl. 103, 185–193 (2018)CrossRef
31.
Zurück zum Zitat Yang, C., Liu, Y., Tao, X.: Assure deletion supporting dynamic insertion for outsourced data in cloud computing. Int. J. Distrib. Sens. Netw. 16(9), 155014772095829 (2020)CrossRef Yang, C., Liu, Y., Tao, X.: Assure deletion supporting dynamic insertion for outsourced data in cloud computing. Int. J. Distrib. Sens. Netw. 16(9), 155014772095829 (2020)CrossRef
32.
Zurück zum Zitat Miao, M., Ma, J., Huang, X., Wang, Q.: Efficient verifiable databases with insertion/deletion operations from delegating polynomial functions. IEEE Trans. Inf. Forensics Secur. 13(2), 511–520 (2018)CrossRef Miao, M., Ma, J., Huang, X., Wang, Q.: Efficient verifiable databases with insertion/deletion operations from delegating polynomial functions. IEEE Trans. Inf. Forensics Secur. 13(2), 511–520 (2018)CrossRef
33.
Zurück zum Zitat Wang, Q., Zhou, F., Xu, J., Xu, Z.: Efficient verifiable databases with additional insertion and deletion operations in cloud computing. Future Gener. Comput. Syst. 115, 553–567 (2021)CrossRef Wang, Q., Zhou, F., Xu, J., Xu, Z.: Efficient verifiable databases with additional insertion and deletion operations in cloud computing. Future Gener. Comput. Syst. 115, 553–567 (2021)CrossRef
34.
Zurück zum Zitat Merkle, R.: A certified digital signature. In: Proceedings of the Conference on the Theory and Application of Cryptology. CRYPTO, pp. 218–238. New York, NY (1989) Merkle, R.: A certified digital signature. In: Proceedings of the Conference on the Theory and Application of Cryptology. CRYPTO, pp. 218–238. New York, NY (1989)
35.
Zurück zum Zitat ANSI X9.62, FIPS 186-2: Elliptic Curve Digital Signature Algorithm (1998) ANSI X9.62, FIPS 186-2: Elliptic Curve Digital Signature Algorithm (1998)
36.
Zurück zum Zitat Androulaki, E., Barger, A., Bortnikov, V., Cachin, C., Christidis, K., Caro, A., et al. Hyperledger fabric: a distributed operating system for permissioned blockchains. The Thirteenth EuroSys Conference. EuroSys '18, pp. 1–15. ACM, New York, NY, USA (2018) Androulaki, E., Barger, A., Bortnikov, V., Cachin, C., Christidis, K., Caro, A., et al. Hyperledger fabric: a distributed operating system for permissioned blockchains. The Thirteenth EuroSys Conference. EuroSys '18, pp. 1–15. ACM, New York, NY, USA (2018)
Metadaten
Titel
Supporting dynamic update scheme for assured deletion based-multi-copy association tree
verfasst von
Junfeng Tian
Ruxin Bai
Tianfeng Zhang
Publikationsdatum
17.06.2023
Verlag
Springer US
Erschienen in
Cluster Computing / Ausgabe 2/2024
Print ISSN: 1386-7857
Elektronische ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-023-04019-5

Weitere Artikel der Ausgabe 2/2024

Cluster Computing 2/2024 Zur Ausgabe

Premium Partner